/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_otp.c | 40 size_t password_len, len; local 51 password = eap_get_config_otp(sm, &password_len); 55 password = eap_get_config_password(sm, &password_len); 72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 76 wpabuf_put_data(resp, password, password_len); 78 password, password_len);
|
mschapv2.c | 43 const u8 *password, size_t password_len, 71 password, password_len); 80 password, password_len); 83 password, password_len, nt_response); 84 generate_authenticator_response(password, password_len, 98 nt_password_hash(password, password_len, password_hash);
|
mschapv2.h | 25 const u8 *password, size_t password_len,
|
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 83 password = eap_get_config_otp(sm, &password_len); 87 password = eap_get_config_password(sm, &password_len); 104 plen = password_len; 119 wpabuf_put_data(resp, password, password_len);
|
eap_md5.c | 42 size_t len, challenge_len, password_len; local 44 password = eap_get_config_password(sm, &password_len); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
eap_leap.c | 72 size_t identity_len, password_len, len; local 78 password = eap_get_config_password2(sm, &password_len, &pwhash); 126 nt_challenge_response(challenge, password, password_len, rpos); 196 size_t password_len, len; local 201 password = eap_get_config_password2(sm, &password_len, &pwhash); 238 nt_password_hash(password, password_len, pw_hash); 274 size_t password_len; local 277 password = eap_get_config_password(sm, &password_len); 334 size_t elen[5], password_len; local 340 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
eap_config.h | 71 * password_len - Length of password field 73 size_t password_len; member in struct:eap_peer_config
|
eap_mschapv2.c | 161 size_t identity_len, password_len; local 168 password = eap_get_config_password2(sm, &password_len, &pwhash); 213 password_len, pwhash, auth_challenge, 309 config->password_len = 16; 318 config->password_len = config->new_password_len; 503 size_t username_len, password_len, new_password_len; local 510 password = eap_get_config_password2(sm, &password_len, &pwhash); 543 password, password_len, cp->encr_password)) 558 password, password_len, cp->encr_hash);
|
eap_ikev2.c | 68 size_t identity_len, password_len; local 93 password = eap_get_config_password(sm, &password_len); 95 data->ikev2.shared_secret = os_malloc(password_len); 98 os_memcpy(data->ikev2.shared_secret, password, password_len); 99 data->ikev2.shared_secret_len = password_len;
|
eap_ttls.c | 646 size_t identity_len, password_len; local 652 password = eap_get_config_password2(sm, &password_len, &pwhash); 695 password_len, pwhash, challenge, 731 size_t identity_len, password_len; local 737 password = eap_get_config_password2(sm, &password_len, &pwhash); 781 nt_challenge_response(challenge, password, password_len, 784 password, password_len); 821 size_t identity_len, password_len; local 826 password = eap_get_config_password(sm, &password_len); 830 msg = wpabuf_alloc(identity_len + password_len + 100) 881 size_t identity_len, password_len; local [all...] |
/external/wpa_supplicant/ |
eap_otp.c | 44 size_t password_len, len; local 57 password = eap_get_config_otp(sm, &password_len); 61 password = eap_get_config_password(sm, &password_len); 79 password_len, EAP_CODE_RESPONSE, req->identifier, 83 os_memcpy(rpos, password, password_len); 85 password, password_len);
|
ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 38 size_t password_len, u8 *response); 42 void nt_password_hash(const u8 *password, size_t password_len,
|
eap_gtc.c | 59 size_t password_len, identity_len, len, plen; local 86 password = eap_get_config_otp(sm, &password_len); 90 password = eap_get_config_password(sm, &password_len); 107 plen = password_len; 124 os_memcpy(rpos, password, password_len);
|
ms_funcs.c | 55 * @password_len: Length of password 58 void nt_password_hash(const u8 *password, size_t password_len, 64 if (password_len > 256) 68 for (i = 0; i < password_len; i++) { 73 len = password_len * 2; 117 * @password_len: Length of password 122 const u8 *password, size_t password_len, 130 nt_password_hash(password, password_len, password_hash); 215 * @password_len: Length of password 224 void generate_authenticator_response(const u8 *password, size_t password_len, [all...] |
eap_leap.c | 74 size_t identity_len, password_len; local 79 password = eap_get_config_password(sm, &password_len); 126 nt_challenge_response(challenge, password, password_len, rpos); 201 size_t password_len; local 205 password = eap_get_config_password(sm, &password_len); 242 nt_password_hash(password, password_len, pw_hash); 278 size_t len, password_len; local 281 password = eap_get_config_password(sm, &password_len); 335 size_t elen[5], password_len; local 340 password = eap_get_config_password(sm, &password_len); [all...] |
eap_md5.c | 45 size_t len, challenge_len, password_len; local 49 password = eap_get_config_password(sm, &password_len); 104 elen[1] = password_len;
|
eap_mschapv2.c | 183 const u8 *password, size_t password_len, 196 password, password_len); 199 password, password_len, nt_response); 204 generate_authenticator_response(password, password_len, 212 nt_password_hash(password, password_len, password_hash); 230 size_t username_len, identity_len, password_len; local 236 password = eap_get_config_password(sm, &password_len); 284 password, password_len, 380 config->password_len = config->new_password_len; 573 size_t username_len, password_len, new_password_len local [all...] |
config_ssid.h | 258 * password_len - Length of password field 260 size_t password_len; member in struct:wpa_ssid
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 38 size_t password_len, u8 *response); 42 void nt_password_hash(const u8 *password, size_t password_len, 51 const u8 *password, size_t password_len,
|
ms_funcs.c | 55 * @password_len: Length of password 58 void nt_password_hash(const u8 *password, size_t password_len, 64 if (password_len > 256) 65 password_len = 256; 68 for (i = 0; i < password_len; i++) { 73 len = password_len * 2; 117 * @password_len: Length of password 122 const u8 *password, size_t password_len, 130 nt_password_hash(password, password_len, password_hash); 215 * @password_len: Length of passwor [all...] |
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_2.c | 22 @param password_len The length of the password (octets) 31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, 78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { 95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
|
pkcs_5_1.c | 21 @param password_len The length of the password (octet) 29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 74 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 80 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap.h | 38 size_t password_len; member in struct:eap_user
|
eap_ttls.c | 250 size_t password_len = dlen; local 251 while (password_len > 0 && 252 password[password_len - 1] == '\0') { 253 password_len--; 257 password, password_len); 259 parse->user_password_len = password_len; 660 if (sm->user->password_len != user_password_len || 679 size_t password_len) 685 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) { 689 (unsigned long) password_len); [all...] |